Cyber Terrorism Research Paper

Better Essays
Jacob Klingbeil
Mrs. Foust
Honors English 12
12/5/2017
Motives and Methods of Terrorism In the past decade, terrorism has increasingly become more of a problem. With advances in technology, terrorists have found new ways to strike fear. Identifying and preventing attacks has become much harder because of these advancements. Along with the many methods of attack, there are several different motives for attack. There may not be an easy solution to the issue of terrorism, since there are many problems to address. It is important to identify the different motives and methods of attack so that finding the solution to terrorism becomes easier. Terrorism hides in many different shapes and forms, and without the knowledge of why and how terrorists
…show more content…
Cyber terrorism is the use of technology to cause fear. The FBI says that cyber terrorism is,” The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” (Coleman). Today, computers and the internet are used for many things. Sensitive information is stored without much thought about its security. A terrorist could take advantage of these security flaws and steal the information. Stealing information is the least destructive outcome of cyber terrorism. A terrorist could hack the control system for something volatile, such as a gas pipeline, and cause it to malfunction and explode. The hacker may not even need physical access to the control system, and could launch the attack from anywhere. Anything that is connected to a computer or the internet has the possibility of being hacked. Infrastructure such as power plants, and water plants could be sabotaged. The worst-case scenario that a terrorist disable, or takes control of a country’s defense system. These attacks may become common in future years because they cost hardly anything at all. The attacks just require a computer, internet access, and someone experienced. It also is very hard to trace the origin of a cyber-attack. Cyber terrorism may become the most common type of terrorism because of how convenient it is to affect a large group of people with one

Related Documents

  • Decent Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system. With credit card, bank account and all personal information stored on the computer now, all of…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”. Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Using cyber terrorism is a serious crime and should be stopped. The CIA group keeps track of this happening daily to stop people from hacking others email addresses or passwords. (csciwww.etsu.edu) More types of terrorism are: state sponsored, anti state, international, and domestic. They all involve with finding out information secretly by using terrorists groups. But terrorists focus on one part of a country at a time.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files...the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common. Now that all important or personal documents, including secret government documents are electronic, they often are protected by firewalls are complicated encryption codes. Though these technological advances are great to protect information and keep people safe, it has also become a problem since there are many intelligent…

    • 1158 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    These are professionally organized groups which maliciously hack into systems for online money grabbing. This is a major security concern as these groups manage to get away with passwords and other credentials which enable them to steal from online money baking systems. Another security issue includes the hacktivists for instance the infamous anonymous group (Singer & Friedman, 2014). The hacking game has been taken to another level as politically motivated information systems hackers are now doing it in the open and is being acknowledged and accepted as a form of political activism. Political hacktivism is therefore posing serious threat to the security in IT industry as victims feel the monetary pain to forceful compelling to certain political affiliations (Shoemaker & Sigler,…

    • 1268 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. Hacking can lead to theft of important information which can be sold to other competitors.…

    • 1208 Words
    • 5 Pages
    Decent Essays